at least every 3 years
at least annually
significant changes
twenty-four (24) hours
eight (8) hours
eight (8) hours
quarterly for privileged access, annually for non-privileged access
Selection: disables
no more than 96 hours from last use
24 hours for user accounts
ninety (90) days (See additional requirements and guidance.)
for privileged users, it is the end of a user's standard work period
organization-defined need with justification statement that explains why such accounts are necessary
at a minimum, the ISSO and/or similar role within the organization
one (1) hour
all security functions
at a minimum, annually
all users with privileges
see additional Requirements and Guidance
see additional Requirements and Guidance
fifteen (15) minutes
at least quarterly
at least every 3 years
at least annually
significant changes
at least annually
at least annually
at least annually
at least annually
at least one (1) year or 1 year after completion of a specific training program
at least every 3 years
at least annually
significant changes
successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes
organization-defined subset of the auditable events defined in AU-2a to be audited continually for each identified event.
annually and whenever there is a change in the threat environment
session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon; individual identities of group account users; full-text of privileged commands
overwrite oldest record
at least weekly
one second granularity of time measurement
a time period in compliance with M-21-31
all information system and network components where audit capability is deployed/available
at least every 3 years
at least annually
significant changes
at least annually
individuals or roles to include FedRAMP PMO
any FedRAMP Accredited 3PAO
the conditions of the JAB/AO in the FedRAMP Repository
at least annually and on input from JAB/AO
at least monthly
in accordance with OMB A-130 requirements or when a significant change occurs
to include JAB/AO
at least annually
at least annually
at least every 3 years
at least annually
significant changes
at least annually and when a significant change occurs
to include when directed by the JAB
Configuration control board (CCB) or similar (as defined in CM-3)
at least quarterly
at least annually
at least quarterly or when there is a change
at least monthly
automated mechanisms with a maximum five-minute delay in detection
continuously
Continuously (via CM-7 (5))
Federal data and system data that must be protected at the High or Moderate impact levels
at least every 3 years
at least annually
significant changes
at least annually
all
time period defined in service provider and organization SLA
*See Additional Requirements
at least annually
at least annually
at least annually
functional exercises
daily incremental; weekly full
daily incremental; weekly full
daily incremental; weekly full
at least annually
all backup files
at least every 3 years
at least annually
significant changes
local, network and remote
privileged accounts; non-privileged accounts
FIPS-validated or NSA-approved cryptography
privileged accounts; non-privileged accounts
at a minimum, the ISSO (or similar role within the organization)
at least two (2) years
contractors; foreign nationals
at least every 3 years
at least annually
significant changes
ten (10) days for privileged users, thirty (30) days for Incident Response roles
at least annually
at least annually
functional, at least annually
US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)
at least annually
see additional FedRAMP Requirements and Guidance
see additional FedRAMP Requirements and Guidance
at least annually
at least every 3 years
at least annually
significant changes
at least annually
the information owner
a timeframe to support advertised uptime and availability
at least every 3 years
at least annually
significant changes
all types of digital and/or non-digital media containing sensitive information
no removable media types
organization-defined security safeguards not applicable
all types of digital and non-digital media with sensitive information
see additional FedRAMP requirements and guidance
all media with sensitive information
prior to leaving secure/controlled environment: for digital media, encryption in compliance with Federal requirements and utilizes FIPS validated or NSA approved cryptography (see SC-13.); for non-digital media, secured in locked container
techniques and procedures IAW NIST SP 800-88 Section 4: Reuse and Disposal of Storage Media and Hardware
at least every 3 years
at least annually
significant changes
at least annually
CSP defined physical access control systems/devices AND guards
in all circumstances within restricted access area where the information system resides
at least annually
at least annually or earlier as required by a security relevant event.
at least monthly
for a minimum of one (1) year
at least monthly
near more than one egress point of the IT area and ensures it is labeled and protected by a cover to prevent accidental shut-off
service provider building maintenance/physical security personnel
service provider emergency responders with incident response responsibilities
consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments
continuously
all information system components
at least every 3 years
at least annually
significant changes
to include chief privacy and ISSO and/or similar role or designees
to include chief privacy and ISSO and/or similar role
at least annually
at least every 3 years
at least annually and when the rules are revised or changed
at least annually and when a significant change occurs
at least every 3 years
at least annually
significant changes
at least every three years
for national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance.
For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions
personnel screening criteria - as required by specific information
four (4) hours
twenty-four (24) hours
including access control personnel responsible for the system
twenty-four (24) hours
at least annually
at least annually and any time there is a change to the user's level of access
including access control personnel responsible for the system and/or facilities, as appropriate
within twenty-four (24) hours
to include the ISSO and/or similar role within the organization
24 hours
at least every 3 years
at least annually
significant changes
security assessment report
at least every three (3) years and when a significant change occurs
at least every three (3) years
monthly operating system/infrastructure; monthly web applications (including APIs) and databases
high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery
within 24 hours prior to running scans
all components that support authentication
all scans
at least every 3 years
at least annually
significant changes
at a minimum to include security-relevant external system interfaces; high-level design; low-level design; source code or network and data flow diagram;
at a minimum, the ISSO (or similar role within the organization)
Appropriate FedRAMP Security Controls Baseline (s) if Federal information is processed or stored within the external system
Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored
all external systems where Federal information is processed or stored
information processing, information or data, AND system services
development, implementation, AND operation
frequency at least annually
FedRAMP Security Authorization requirements
at least every 3 years
at least annually
significant changes
Protect against
at a minimum: ICMP (ping) flood, SYN flood, slowloris, buffer overflow attack, and volume attack
at least every 180 days or whenever there is a change in the threat environment that warrants a review of the exceptions
any systems
any network outside of organizational control and any network outside the authorization boundary
Host Intrusion Prevention System (HIPS), Host Intrusion Detection System (HIDS), or minimally a host-based firewall
confidentiality AND integrity
prevent unauthorized disclosure of information AND detect changes to information
no longer than ten (10) minutes for privileged sessions and no longer than fifteen (15) minutes for user sessions
In accordance with Federal requirements
FIPS-validated or NSA-approved cryptography
no exceptions for computing devices
confidentiality AND integrity
all information system components storing Federal data or system data that must be protected at the High or Moderate impact levels
At least hourly
http://tf.nist.gov/tf-cgi/servers.cgi
any difference
at least every 3 years
at least annually
significant changes
within thirty (30) days of release of updates
at least monthly
signature based and non-signature based
at least weekly
to include endpoints and network entry and exit points
to include blocking and quarantining malicious code
administrator or defined security personnel near-realtime
continuously
to include US-CERT and Cybersecurity and Infrastructure Security Agency (CISA) Directives
to include system security personnel and administrators with configuration/patch-management responsibilities
to include upon system startup and/or restart
at least monthly
to include system administrators and security personnel
selection to include security relevant event
at least monthly
to include the ISSO and/or similar role within the organization
to include chief privacy and ISSO and/or similar role or designees
at least every 3 years
at least annually
significant changes
at least annually
at least annually
notification of supply chain compromises and results of assessment or audits
all
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the JAB/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.
The service provider defines the time period of inactivity for device identifiers.
For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP https://public.cyber.mil/dccs/.
Should use a shorter timeframe than AC-12.
Required if shared/group accounts are deployed.
Required for privileged accounts.
Required for privileged accounts.
CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.
Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.
In alignment with NIST SP 800-63B
The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.
The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.
If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.
If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.
The interrelated controls of AC-20, CA-3, and SA-9 should be differentiated as follows:
AC-20 describes system access to and from external systems.
CA-3 describes documentation of an agreement between the respective system owners when data is exchanged between the CSO and an external system.
SA-9 describes the responsibilities of external system owners. These responsibilities would typically be captured in the agreement required by CA-3.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.
Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.
For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.
Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.
The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.
The service provider must support Agency requirements to comply with M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf)
The service provider is encouraged to align with M-21-31 where possible
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Reference FedRAMP Annual Assessment Guidance.
For JAB Authorization, must use an accredited 3PAO.
POA&Ms must be provided at least monthly.
Reference FedRAMP-POAM-Template
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F and according to FedRAMP Significant Change Policies and Procedures. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually.
CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (Con Mon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSPs authorized via the Agency path as each agency customer is responsible for performing Con Mon oversight. It does not apply to CSPs authorized via the JAB path because the JAB performs Con Mon oversight.
FedRAMP does not provide a template for the Continuous Monitoring Plan. CSPs should reference the FedRAMP Continuous Monitoring Strategy Guide when developing the Continuous Monitoring Plan.
Reference the FedRAMP Penetration Test Guidance.
See the FedRAMP Documents page> Penetration Test Guidance
https://www.FedRAMP.gov/documents/
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.
In accordance with record retention policies and procedures.
The service provider shall use the DoD STIGs to establish configuration settings; Center for Internet Security up to Level 2 (CIS Level 2) guidelines shall be used if STIGs are not available; Custom baselines shall be used if CIS is not available.
The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).
Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.
During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.
The service provider shall use Security guidelines (See CM-6) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if STIGs or CIS is not available.
This control refers to software deployment by CSP personnel into the production environment. The control requires a policy that states conditions for deploying software. This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. allow-listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.
must be provided at least monthly or when there is a change.
FedRAMP does not provide a template for the Configuration Management Plan. However, NIST SP 800-128, Guide for Security-Focused Configuration Management of Information Systems, provides guidelines for the implementation of CM controls as well as a sample CMP outline in Appendix D of the Guide
According to FedRAMP Authorization Boundary Guidance
According to FedRAMP Authorization Boundary Guidance.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
For JAB authorizations the contingency lists include designated FedRAMP personnel.
CSPs must use the FedRAMP Information System Contingency Plan (ISCP) Template (available on the fedramp.gov: https://www.fedramp.gov/assets/resources/templates/SSP-A06-FedRAMP-ISCP-Template.docx).
Privileged admins and engineers must take the basic contingency training within 10 days. Consideration must be given for those privileged admins and engineers with critical contingency-related roles, to gain enough system context and situational awareness to understand the full impact of contingency training as it applies to their respective level. Newly hired critical contingency personnel must take this more in-depth training within 60 days of hire date when the training will have more impact.
The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.
The service provider must include the Contingency Plan test results with the security package within the Contingency Plan-designated appendix (Appendix G, Contingency Plan Test Report).
The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.
The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.
The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.
The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.
The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.
Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
For all control enhancements that specify multifactor authentication, the implementation must adhere to the Digital Identity Guidelines specified in NIST Special Publication 800-63B.
Multi-factor authentication must be phishing-resistant.
All uses of encrypted virtual private networks must meet all applicable Federal requirements and architecture, dataflow, and security and privacy controls must be documented, assessed, and authorized to operate.
"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.
According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).
Multi-factor authentication must be phishing-resistant.
Multi-factor authentication to subsequent components in the same user domain is not required.
According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).
Multi-factor authentication must be phishing-resistant.
Multi-factor authentication to subsequent components in the same user domain is not required.
PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.
See SC-13 Guidance for more information on FIPS-validated or NSA-approved cryptography.
Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.
Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3
SP 800-63C Section 6.2.3 Encrypted Assertion requires that authentication assertions be encrypted when passed through third parties, such as a browser. For example, a SAML assertion can be encrypted using XML-Encryption, or an OpenID Connect ID Token can be encrypted using JSON Web Encryption (JWE).
Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.
For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.
For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.
Note that (c) and (d) require the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13).
In this context, prohibited static storage refers to any storage where unencrypted authenticators, such as passwords, persist beyond the time required to complete the access process.
The fixed time period cannot exceed the limits set in SP 800-63. At this writing they are:
In accordance with NIST SP 800-63A Enrollment and Identity Proofing
In accordance with NIST SP 800-63A Enrollment and Identity Proofing
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). Functional testing must occur prior to testing for initial authorization. Annual functional testing may be concurrent with required penetration tests (see CA-8). The service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test commencing.
The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."
The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.
Reports security incident information according to FedRAMP Incident Communications Procedure.
The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.
The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Only MA-5 (1) (a) (1) is required by FedRAMP Moderate Baseline
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Second parameter not-applicable
The service provider defines controlled areas within facilities where the information and information system reside.
The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The service provider measures temperature at server inlets and humidity levels by dew point.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
Select the appropriate FedRAMP Baseline
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.
Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/
an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.
to include all Authorizing Officials; for JAB authorizations to include FedRAMP
Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.
Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.
Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).
The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.
track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.
The service provider must document its methodology for reviewing newly developed code for the Service in its Continuous Monitoring Plan.
If Static code analysis cannot be performed (for example, when the source code is not available), then dynamic code analysis must be performed (see SA-11 (8))
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
SC-7 (b) should be met by subnet isolation. A subnetwork (subnet) is a physically or logically segmented section of a larger network defined at TCP/IP Layer 3, to both minimize traffic and, important for a FedRAMP Authorization, add a crucial layer of network isolation. Subnets are distinct from VLANs (Layer 2), security groups, and VPCs and are specifically required to satisfy SC-7 part b and other controls. See the FedRAMP Subnets White Paper (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf) for additional information.
For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing
For each instance of data in transit, confidentiality AND integrity should be through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5), or in combination.
For clarity, this control applies to all data in transit. Examples include the following data flows:
The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).
FedRAMP-Defined Assignment / Selection Parameters
SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when outside of Controlled Access Area (CAA)]
SC-8 (5)-2 [prevent unauthorized disclosure of information AND detect changes to information]
SC-8 (5) applies when physical protection has been selected as the method to protect confidentiality and integrity. For physical protection, data in transit must be in either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.
Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).
Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).
Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.
CNSSI No.7003 can be accessed here:
https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_2015.pdf
DHS Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies can be accessed here:
https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf
Please ensure SSP Section 10.3 Cryptographic Modules Implemented for Data At Rest (DAR) and Data In Transit (DIT) is fully populated for reference in this control.
See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"
SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.
Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)
When leveraging encryption from the underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
See references in NIST 800-53 documentation.
Must meet applicable Federal Cryptographic Requirements. See References Section of control.
Wildcard certificates may be used internally within the system, but are not permitted for external customer access to the system.
This control applies to all use of cryptography. In addition to encryption, this includes functions such as hashing, random number generation, and key generation. Examples include the following:
The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS 140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program (CMVP).
https://csrc.nist.gov/projects/cryptographic-module-validation-program
For NSA-approved cryptography, the National Information Assurance Partnership (NIAP) oversees a national program to evaluate Commercial IT Products for Use in National Security Systems. The NIAP Product Compliant List can be found at the following location:
https://www.niap-ccevs.org/Product/index.cfm
When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
Moving to non-FIPS CM or product is acceptable when:
At a minimum, this control applies to cryptography in use for the following controls: AU-9(3), CP-9(8), IA-2(6), IA-5(1), MP-5, SC-8(1), and SC-28(1).
The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.
Control Description should include how DNSSEC is implemented on authoritative DNS servers to supply valid responses to external DNSSEC requests.
SC-20 applies to use of external authoritative DNS to access a CSO from outside the boundary.
External authoritative DNS servers may be located outside an authorized environment. Positioning these servers inside an authorized boundary is encouraged.
CSPs are recommended to self-check DNSSEC configuration through one of many available analyzers such as Sandia National Labs (https://dnsviz.net)
Control description should include how DNSSEC is implemented on recursive DNS servers to make DNSSEC requests when resolving DNS requests from internal components to domains external to the CSO boundary.
Internal recursive DNS servers must be located inside an authorized environment. It is typically within the boundary, or leveraged from an underlying IaaS/PaaS.
Accepting an unsigned reply is acceptable
SC-21 applies to use of internal recursive DNS to access a domain outside the boundary by a component inside the boundary.
The organization supports the capability to use cryptographic mechanisms to protect information at rest.
When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.
Note that this enhancement requires the use of cryptography in accordance with SC-13.
Organizations should select a mode of protection that is targeted towards the relevant threat scenarios.
Examples:
A. Organizations may apply full disk encryption (FDE) to a mobile device where the primary threat is loss of the device while storage is locked.
B. For a database application housing data for a single customer, encryption at the file system level would often provide more protection than FDE against the more likely threat of an intruder on the operating system accessing the storage.
C. For a database application housing data for multiple customers, encryption with unique keys for each customer at the database record level may be more appropriate.
The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.
The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.
Synchronization of system clocks improves the accuracy of log analysis.
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
See US-CERT Incident Response Reporting Guidelines.
In accordance with the incident response plan.
Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.
When CSO sends email on behalf of the government as part of the business offering, Control Description should include implementation of Domain-based Message Authentication, Reporting & Conformance (DMARC) on the sending domain for outgoing messages as described in DHS Binding Operational Directive (BOD) 18-01.
https://cyber.dhs.gov/bod/18-01/
CSPs should confirm DMARC configuration (where appropriate) to ensure that policy=reject and the rua parameter includes reports@dmarc.cyber.dhs.gov. DMARC compliance should be documented in the SI-08 control implementation solution description, and list the FROM: domain(s) that will be seen by email recipients.
Validate all information inputs and document any exceptions
This response must address all control sub-statement requirements.
This response must address all control sub-statement requirements.
CSO must document and maintain the supply chain custody, including replacement devices, to ensure the integrity of the devices before being introduced to the boundary.
CSOs must ensure that their supply chain vendors build and test their systems in alignment with NIST SP 800-171 or a commensurate security and compliance framework. CSOs must ensure that vendors are compliant with physical facility access and logical access controls to supplied products.
CSOs must ensure and document how they receive notifications from their supply chain vendor of newly discovered vulnerabilities including zero-day vulnerabilities.
CSOs must ensure that their supply chain vendors provide authenticity of software and patches and the vendor must have a plan to protect the development pipeline.
FedRAMP Logo